Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)

IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

Challenges for the preliminary technological


development in the Health Network System
of wireless sensors
K .Kiran Kumar1 G Narayana
2
M. Venunath3 Syed Umar4
Professor Dept. of ECSE Assoc. Professor Dept. of CSE Asst.Pror Dept. of CSE Professor of CSE
KL University,Guntur,India JBREC,Hyderabad,India JBREC,Hyderabad,India JBREC,Hyderabad,India
kiran5232@gmail.com narayanag.1973@gmail.com tovenunath@gmail.com umar332@gmail.com

ABSTRACT: Keywords: challenges, health System, E-governess,


Sensor networks, Binary PSO.
Recent developments in e Government
efforts have led to changes in internet, technology and
the global web to provide better access to citizens and
businesses as governments in their internal I. INTRODUCTION:
operations. One of the revolutionary developments is In this challenge, it is difficult to increase
the adoption of wireless technology in government legal requirements and increase the amount of
activities. E-governance is an instrument that information and counteract the dangers of commercial
influences the management of governance processes information and commercial value. It is an application
in developing countries. E-governance works on the for public services of electronic information and
interface between information and communication communication technology (ICT) Details of
technology (ICT) and the governance process (GP). communication exchange events, integration between
An effective governance model is a system that is different state and federal independent systems and
systematically applied to specific areas of health. services, citizens (G2C), government (G2B) and G2G
Given that e-governance is involved in the transfer of (government and the government) Post and
global technology from the context of the project into interaction processes within the framework of the
different social contexts. Community Health Services governance framework [1]. With e-government,
is a collaboration program between clinical medical public services are delivered to the public in a cost-
programs and the Department of Health Systems; The effective, efficient and transparent way. In general,
management and health and health system is an four basic models are available: Customer
interdisciplinary program that assesses, provides and Management (Citizens), Employee Management
devotes to healthcare to the public. This is a response Public Administration and Trade Commission [2].
that gives the government access to information from The use of ICT in public administration - in
all sectors and gives them valuable advice. The need combination with organizational changes and new
to gather data on the physical, physiological, skills - enhances public services and democratic
psychological, cognitive and social processes of urban processes and supports the community. ICT
and rural behaviour of urban spaces. In this document, management must develop the knowledge of the
we mention the availability of the latest technologies process and formulate opinions among the different
that enable the collection, storage, retrieval and actors with significant contexts and policies.
security of information systems through wireless Stakeholders so e-government is an attitude that
sensor networks for healthcare. In this work, we "there are technologies that help regulate and control
describe a prototype system that includes the both" from [3]. Wireless data transfer is now made by
application of physiological monitoring and the consumers for a simple reason, such as wireless
activity of urban and rural hospitals and labour, and internet data is about 15% and 20% of all times.
focuses on the challenges of daily care and Successfully focused on the vertical market, such as
information. Then the higher authority can check at public safety, health, education, management,
any time. Panchayat Raj and the behaviour of the horizontal
market (consumers) on the growth of wireless

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1173


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

communication Internet is a system that users expect organizations, citizens and states, municipal and local
the expectations of Has changed access to businesses, and enable citizens to get information and
information. The ability to receive information from use. Electronic governance is useful in many ways
the Internet is a "search amplifier" for wireless data through various government initiatives in different
applications. electronic concept of E Government states of India to a big city or small city.
with technology management E-Government is the
use of ICT in public services, data download,
communication, system integration and various G2B,
G2G and back office processes and interactions in
government. is a kind of parliamentary government II. EHS CHALLENGES IN THE SOCIETY
after the federal structure is a unitary element: The
Targeted action within the organization is the
Council of Ministers has advised the Prime Minister,
only management they have from the foreign
who recommended the President of the Constitutional
government. Therefore, governance and management
Court, the State and the Ministers of the Prime
are not the same. An ICT application can be
Minister? For the long-term growth of e-governance
simplified. ICT can be linked to health information to
in the country. This section contains information on
enable the internet by creating a PPP model and
good governance and institutional mechanisms,
helping customers get in touch. Patients are divided
infrastructure and policies of the Mission Central
across different levels of healthcare through an
Project Mode and participation in the Centre, States,
electronic forum for building a system to
District, Block and Integrated Service. The Socialist
communicate with the patient's E-prescription. It's
is a Social Democrat The presidency of the Republic
time to investigate how physicians and IT staff work
of India is in the form of a parliamentary government,
together to reduce healthcare costs, create high quality
which is a federal structure with uniform features.
services, manage healthcare, and manage well-
The Council of Ministers with the Prime Minister as
managed urban decorations. Look at state-of-the-art
adviser to the president who is the constitutional
technology in low-energy sensors, such as those
leader of the country. The state must also trust the
derived from healthcare sensory networks (SNMs),
Council of Ministers in cooperation with the Prime
improve quality of care through several parameters
Minister as Governor's Chief Adviser. This section
and expanding different sections of the population.
provides an overview of government and Indian
The intention is a wireless sensor for active support
administration in the centre, both in state and local.
and guidance for patients who are interested in
Information about the constitution of India,
reducing sensory and motor skills. New types of
Parliament and the law gives the administration of the
intelligent devices used on the physiological and
Union, the state, the region and the local government.
physical condition of the sensors built into the device
He is deeply concerned about health care because the
are used or inoculants, a patient user, and are
quality of life is involved with a particular person. It
integrated into the environment. General hospitals in
is always better to prevent a disease than to treat it
the country or core of the village / block / zone / state
and therefore to check the individual activity on a
provide effective health services and quality through a
regular basis. Population growth is the national
computer application for better patient care and
government to go with the developed countries, and
effective management and control. Traditionally,
there are new challenges for health systems, namely
health is regularly monitored, with the patient being a
elderly in elderly homes [4]. Fuse, relevant, prolonged
sign to remember; The doctor performs checks and
storage, recovery, distribution, analysis and better
the diagnosis should be formulated as possible and
decision making, effective allocation of resources,
monitored for the progress of patient treatment. It
targeted health interventions, patient needs and
enables ICT. Health is for the patient to perform
community needs to build changes in preventive
duties or supervisors to not investigate wireless sensor
behaviour and identify health promotion, effective
networks.
management disease and better care. These can be
chains of electronic governance value to improve the
flow of information. The nature of the workflow is
known, as is the principle of prevention of health. E-
government is not of information and communication
technology to ensure the effectiveness, efficiency,
transparency and accountability of the information
exchange and trade within the government between
the government has changed. & Govt National

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1174


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

example, such advantages are to be considered that


the areas with little change or no change between the
same pixels. Therefore, images with a wide variety of
colours will have huge fired images and other images
that have big and often changing changes are
excessive and difficult to compress. This analysis can
be used to show parts of image information on the
harmonization and side showing the initial trend of
pixel values. Three sub-data shows the vertical,
horizontal and cross data or changing the image. If
these data are very small, they can be set to zero
without significant changes in the image. If these
values are in the threshold, they can be set to zero
[49]. Since these values are lower than the values of
Figure 1. Healthcare with different networks of the threshold then they will be zero. In this way, if we
wireless sensors get enough zero, we can say that the image is
compressed. After the image compression [50-51] is
These challenges about the capacity limitations of above the target to receive or receive the image. The
each WSN in terms of limited network capacity, process of detecting the image is to solve compression
processing, and memory restrictions, as well as scarce than in a calendar-wise manner. "If the 100%
energy reserves. In particular, unlike other areas of restricted energy gives the process less energy, the
application, healthcare applications provide stringent image is built up immediately. If the image is not
requirements for system reliability, quality of service, completely rejected, it is the type of compression that
and in particular privacy and security. In this paper, has called depression, the type of compression.
we need to raise these challenges and give examples
of your first efforts to address them. The monitoring
signal vital can achieve data very reliably over wired
networks wireless networks multimedia used in the
clinic settings to overcome energy and bandwidth by
pre-preaching smart measurements through the
application of high medical rates collected, such as
motion analysis the disease's disease your
parkinsonism Analysis of privacy and security
obligations and possible solutions in living
environments

III. SECURITY TECHNOLOGY FOR HEALTH


RESEARCH

Challenging Healthcare solutions are


integrated into the image technology process. In the
Figure 2 Wavelet technology works by
long run, healthcare solutions and services are likely
means of a double compression and compression
to be integrated into electronic installations,
multifunctional analysis.
machines, and information interfaces. Images are
required for important storage and transmission After compression, the compressed technique is used
sources. Therefore, an image compression technique to obtain the most accurate information to obtain
must be used to reduce data. This paper contains a sensible mechanical techniques. Among the many
number of backgrounds for wave analysis, data available techniques, we go to the particle
compression and how the tunnels were used for image optimization technique. In this technique, we will
compression. The threshold is the main influence on continue an algorithm [52] to get accurate
compressed results to represent the wavelet technique. information. After this algorithm, you still get
The image compression [47] is very important, for accurate and accurate information. There are some
this purpose we will think of the image and measures challenges for long term digital data preservation. In
in the form of a matrix image. If we need to consider this document, we describe how the desired data is
the image in the pixel value matrix. To compress the stored in the digital document system. Our main
image, redundancies [48] must be pursued. For interest in this document is the end user's need for a

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1175


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

digital digitized document. It is crucial to set up a


storage system to implement long-term digital data
protection to meet the end user's needs in relation to
the revised digital document. These circumstances
ensure that exactly what information is stored, in
addition to the digital document and the way we can
not deliver everything to the end user. But maybe he
wants to work with a reworked digital document. We
can assume that they expect them to look at the least
as they do today. That's why it's crucial that future
documents can be made on computers in the future. In
addition, the digital document should be readable and
understandable to end users in the future. Like other
research institutions, education and cultural
institutions, the enormous and complexity of work
needed to store large amounts of unique digital Figure 3. Comments on inertial weights
information. More than enough to build partnerships
to utilize existing mass storage capabilities or use A large tissue weight (w) facilitates global
third party data service providers to meet their needs research and facilitates small local search weights.
for a safe and secure digital storage system. Reducing the inertia weight of a relatively large value
with a small value through the PSO path offers the
III.A Direct data searches best performance of PSO versus fixed weight offer.

To search for the required data, we have many III.B Simulation algorithm using a distribution
algorithms, but not the exact information we need. To cooperation technique
do this, a technique in this document is recommended
to search for data and minimum time without losing There is a distribution system where small processors
information. The algorithm is the technique for are connected. A distributed computer system consists
particle optimization. This enables us to convert the of several independent computers in the same room
real-size data into a binary format and obtain the connected via the internet. The cluster is often called
necessary information. Then, in the short term, it will [54, 55] on this solution. The distribution algorithm is
give us accurate data without losing the information. an algorithm designed to run on a computer built by
PSO is a popular opt-out technique developed by interconnected processors. distribution algorithms
Kennedy and Eberhart (1995) and Shi and Eberhart used in various fields of computer applications in the
(1998) [53]. A randomized population begins. The field of distribution such as telecommunications,
algorithm searches for the best one that meets a scientific computing, distributed data processing and
performance index about the generation. Use the controlled process control over time [56, 57].
number of agents that contain the swarm that moves Standard issues are the solution through leadership
the search space to find the best solution. PSO premium, consensus and distribution search
technology can quickly generate a high-quality opt- algorithm, including generation, mutilation, and
out solution and characterize stable convergence than allocation of resources. In general, the distribution
other optimization methods. There are "single algorithms are performed in parallel with parts of the
filaments" called "particles" in the PSO. Each particle algorithm running simultaneously on independent
shows a possible solution for a size problem and a processors and limited information about the other
genotype is 2 2 * d parameters. The first parameters parts of the algorithm. One of the key challenges of
are the "particle marks" and the following parameters distributed algorithms for developing and
as speed components. These parameters move at an implementing the independent algorithm to correct
adaptive speed within the search room and keep their process failures and unreliable communication links.
memories in the best position they have ever The selection of algorithms depends on the correct
achieved. The parameters are immediately changed distribution to solve a problem, depending on the
from the repeat to the next while moving. Repeat, characteristics of the problem and the system. The
fitness function is calculated as quality measure with algorithm will work so that the probability or
its position vector. Each particle follows its position, connection is not resolved. The type of inter-process
which is linked to the result obtained so far. The best communication can be achieved using the time
position found for the particles holds the track. synchronization level between the individual
processors. The paradigm helps objective-oriented

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1176


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

distribution to dominate the complexity of the overall information. On the other hand, the highest
cooperative systems. To enter a distribution information and characteristics are stored at the
algorithm, it appears in three points: the set of objects lowest level of the tree. Therefore, user needs can be
(distribution entity that has been deployed with adapted between time and precision by choosing the
respect to distributed computing), things (local appropriate tree level. Third, the characteristics of K-
entities) and their methods (activity can be Tree are independent, so that the position of the node
performed). In the methodology, we define a specific in the tree is the same. The problem of inconsistent
abstract machine as an identical/state model. The state index structures occurs when a multidimensional
has a final definition of its definition of the problem is issued. If indexes create structures or types
declaration. This statement was first reported using of data processing by themselves, it is necessary to
conventional logical operators that have been applied use the database to obtain index results from each
to external or local object methods. We include other individual and the combined filters do not respect the
logical operators with parallel functions and space constraints or space. Using K-Tree to search for
distribution. They will leave the informants of each item requires a shorter processing time by using
knowledge and trust. For the final implementation a feature-dependent structure to search for multiple
phase, these operators are reached via call mode. indexes, then blending the results of all and filtering
Finally, a state survey is conducted if it accepts a them with spatial restrictions.
value in a set of possible value definitions. There is a
transfer of the action to take. In fact, we use III.C General Recovery Model
state/action systems. A transfer state has been verified The structure of the tree k used to store the position
and unless it is true, the corresponding action will be information and the histogram serves to characterize
executed. The abstract model makes progressive each part of the data corresponding to the storage part
recovery (in the rest of the labelled paper and similar of the tree. This generalized model is illustrated in
terms) system executable software code. Per our Figure III. First, there are general mathematical
different stages of regeneration, it should be models or methods of special interest. Second, the
emphasized that all models of features and data type domain is reduced to one set, and each
information about the highest levels of behaviour. For element of the database is mapped to the set. Third,
example, when used in specific group proxy virtual data values are added to the data elements if
information, the ream information becomes the object necessary to be created so that each harvest of cranes
specification level object (e.g., via local Boolean can generate. K-crann is constructed using histogram
variables). The distribution system is an autonomous values for each characteristic.
process. For example, information exchange (WAN),
resource allocation (LAN), multiple programming,
parallelization to improve performance, etc. The
estimate is more reliable and mode improves system
design easily. The configuration distribution
algorithm consists of the process and status as channel
messages. One of his processes is to pass on transfer.
You can start and receive an internal event procedure.
Therefore, the process is an internal event or a
shipment. There is a central algorithm if there is a
promoter. Decentralized algorithms can be complete
promoters. To search for an image, we need to use
Miniature as a question because it is thumbnail
images of all parts of the image regardless of the
bottom. The use of a universal image search
algorithm that can represent the characteristics of a
kind of multimedia data to solve problems. We use
the physical image as our key index used by K-Tree
[58].A crisis, the input notes and all the outgoing
nodes 2k, some benefits associated with the amount Figure 4. General index / recovery model
of K is influenced by the complexity of the data
structure. For the type of other data, reuse the III.D. PSO BINARIO
algorithm. Second, the information stored in the
highest tree level is the smallest feature to describe

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1177


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

Multi-function algorithm for multifunction control References:


selection based on PSO binaries for selection of
multifunction rules; we have already reached the [1] Saugata,B., and Masud,R,R.(2007).
classification rules N in the mineral code rule Implementing E -Governance Using OECD
discovery rule. These N rules are used as rules of a Model(Modified) and Gartner Model
candidate in the rule selection phase. Let's be a (Modified) Upon Agriculture of Bangladesh.
substance of the rules of the candidate N (i.e. IEEE. 1-4244-1551-9/07.
Classifier S). The binary length wire represents N or [2] Garson, D.G. (2006). Public Information
S, where "1" is included in S and "0" excludes the Technology and E-Governance. Sudbury,
corresponding candidate rule S. We use the MOPSO MA: Jones and Bartlett Publishers.
binomial to find the best possible set of rules for the [3] Rossel, Pierre, and Matthias Finger,
problem of selecting the next three rule. Maximize f1 “Conceptualizing e-Governance.”
(S) in the case of a correctly classified classification Management (2007) :pp- 399-407
number (S), minimize f2 (S) in the case of several [4] M.Alwan &et.al. “Psychosocial Impact of
rules F2 (S) selected in S, minimize f3 (S) case f3 S) passive Health status Monitoring on
is the total number of preliminary conditions above Informal Caregivers and Older Adults living
the rules selected in S. The first objective is to in Independent Senior Housing ’’ in 2nd
maximize and minimize the second and third targets. Information and Communication
The third objective can be considered as a minimal Technologies Surabaya, Indonesia 2006, pp-
reduction of the entire rule since the prerequisite of 803-813.
each rule is often restored to the rule. [5] JeongGil Ko, & et.al “Wireless Sensor
Networks For Healthcare” Proceedings of
IV. Conclusion the IEEE | Vol.98,No. 11,November 2010 pp
1947-1960.
An important part of the solution the [6] Anjum Razzaque, “A Transcultural Model of
demanding government, E-Governance for E-Governance for the Healthcare Industry
Healthcare, is very important. We have proposed Vector” Journal of Economic Development,
solutions to the global e-governance solution for Mgmt, IT, Finance and Marketing, 1(1), 193-
public health through effective techniques to gain 222, Sept. 2009.
important information. The image search algorithm, a [7] Moshaddique Al Ameen and Kyung-sup
general search model, and the search-based binary Kwak Graduate School of IT and
PSO algorithm are also used to obtain efficient, Telecommunications, Inha University, Korea
compressed and safe search procedures. Electronic “Social Issues in Wireless Sensor Networks
governance is the future; Many countries expect a with Healthcare Perspective "The
government without corruption. Electronic International Arab Journal of Information
government is a one-way communication protocol, Technology, Vol. 8, No. 1, January 2011, pp
although e-governance is a two-way communication 52-58.
protocol. The core of e-governance is essential for the [8] Michaela Lascu & Dan Lascu “Graphical
beneficiaries and ensures that the services addressed Programming based Biomedical Signal
to the requested person are respected. There must be Acquisition-and Processing ”
an automated answering system to support the INTERNATIONAL JOURNAL
foundation of governance, which recognizes OF CIRCUITS, SYSTEMS AND
government effectiveness. Government, government SIGNALPROCESSING , Issue 4, Volume 1,
and government are governed by governments. An 2007,pp- 317-326.
important challenge to determine the identity of the [9] Michaela Lascu & Dan Lascu“ Lab VIEW
final beneficiary in all office-related services. The Electrocardiogram Event and Beat
statistical information published by the government Detection” WSEAS TRANSACTIONS on
and the world organization does not always show the COMPUTER RESEARCH, ISSN: 1991-
facts. The best form of e-governance reduces 8755, Issue 1,Volume 3, January
unwanted voices from runners in providing 2008,pp-9-18.
government services. It depends on the preparation of [10] Romit Pandey and KS Vijaya Sekhar, “From
a good infrastructure with local support for e- Governance to m-Governance: The way
government processes and parameters to reach their forward “ e-Gov - Technological
citizens or the final beneficiaries. Planning, Framework
development and growth budgets can come from
well-structured government systems.

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1178


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

[11] Vertika Shukla,“Current Status of E- International Workshop on Body Sensor


governance in Healthcare in the Large Networks (BSN 2005), April 2005.
Hospitals of Bangalore” Thesis paper. [21] G.-Z. Yang et al. Body Sensor Network
[12] Cerpa, J. Elson, D. Estrin, L. Girod, M. Node.
Hamilton, and J.Zhao.Habitat monitoring: http://www.doc.ic.ac.uk/vip/ubimon/bsn_nod
Application driver for wireless e/ index.html.
communications technology. In Proc. the [22] E. Shih, V. Bychkovsky, D. Curtis, and J.
Workshop on Data Communications in Latin Guttag. Demo abstract: Continuous, remote
America and the Caribbean, Apr. 2001. medical monitoring. In Proc. Second Annual
[13] R. Szewczyk, A. Mainwaring, J. Polastre, International Conference on Embedded
and D. Culler. An analysis of a large scale Networked Sensor Systems, November
habitat monitoring application. In Proc. 2004.
Second ACM Conference on Embedded [23] D. Konstantas, V. Jones, R. Bults, and R.
Networked Sensor Systems (SenSys), Herzog. Mobihealth – innovative 2.5/3g
November 2004. mobile services and applications for
[14] G. Werner-Allen, J. Johnson, M. Ruiz, J. healthcare. In Proc. Eleventh IST Mobile and
Lees, and M. Welsh. Monitoring volcanic Wireless Telecommunications Summit
eruptions with a wireless sensor network. In 2002,Thessaloniki,Greece, June 2002.
Proc. Second European Workshop on [24] E. Dishman. Inventing wellness systems for
Wireless Sensor Networks (EWSN’05), aging in place. IEEE Computer, 37(5), May
January 2005. 2004.
[15] C. Intanagonwiwat, R. Govindan, and D. [25] K. V. Laerhoven, B. P. Lo, J. W. Ng,
Estrin. Directed diffusion: A scalable and S.Thiemjarus, R. King, S. Kwan,H.-W.
robust communication paradigm for sensor Gellersen, M. Sloman, O. Wells, P.
networks. In Proc. International Conference Needham,
on Mobile Computing and Networking, Aug. [26] Peters, A. Darzi,C. Toumazou, and G.-Z.
2000. Yang. Medical healthcare monitoring with
[16] A.Woo, T. Tong, and D. Culler. Taming the wearable and implantable sensors. In Proc.
underlying challenges of reliable multichip Sixth International Conference on
routing in sensor networks. In Proc. the First Ubiquitous Computing, Tokyo, Japan,
ACM Conference on Embedded Networked September 2004.
Sensor Systems (SenSys 2003), November [27] L. Ohno-Machado et al. SMART: Scalable
2003. Medical Alert Response Technology.
[17] M. Maroti, B. Kusy, G. Simon, and A. http://smart.csail.mit.edu/.
Ledeczi. The flooding time synchronization [28] D. White et al. AID-N: Advanced Health and
protocol. In Proc. SenSys’04, Baltimore, Disaster Aid Network.
MD, November 2004. https://secwww.jhuapl.edu/aidn/.
[18] J. Elson, L. Girod, and D. Estrin. Fine- [29] L. Lenert et al. WiiSARD:Wireless Internet
grained network time synchronization using Information System for Medical Response in
reference broadcasts. In Proc. Fifth Disasters. https://wiisard.org.
Symposium on Operating Systems Design [30] E. Shih, V. Bychkovsky, D. Curtis, and J.
and Implementation (OSDI 2002), Boston, Guttag. Demo abstract: Continuous, remote
MA, December 2002. medical monitoring. In Proc. Second Annual
[19] J. Polastre, R. Szewczyk, and D. Culler. International Conference on "Embedded
Telos: Enabling ultra-low power wireless Networked Sensor Systems,” November
research. In Proc. Fourth International 2004.
Conference on Information Processing in [31] BTing-Chen Ke Kuo-Yu Yang, “A wireless
Sensor Networks: Special track on patch-type physiological monitoring
Platform Tools and Design Methods for microsystem,”IEEE Sensors, EXCO, Daegu,
Network Embedded Sensors (IPSN/SPOTS), Korea, October 22-25, pp. 1143-1146, 2006.
April 2005. [32] B.-S. Lin, N.-K. Chou, F.-C. Chong,
[20] B. Lo and G. Z. Yang. Key technical S.-J.Chen, “RTWPMS: A real-time wireless
challenges and current implementations of physiological monitoring system,” IEEE
body sensor networks. In Proc. 2nd Transactions on Information Technology in
Biomedicine, vol. 10, pp. 647-656, 2006.

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1179


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

[33] S. Intille. Enabling population-scale physical [45] Das R K, Dash S S (2007), Telereferal
activity measurement on common mobile Service of NIC- A Helping hand for the
phones. NIH GEI project at MIT. Available Doctors and Inhabitants of KBK districts of
from: Orissa, Adopting e-Governance, GIFT
ttp://www.gei.nih.gov/exposurebiology/ Publishing 2007 , Pages: 253-8
program/docs/StephenIntille.pdf, 2007. [46] Al-Sakib Khan Pathan1 and et. al “A
[34] S. Kumar. Autosense. NIH GEI project at Framework for Providing E-Services to the
The University of Memphis. Available from: Rural Areas using Wireless Ad Hoc and
http://www.cs.memphis.edu/santosh/AutoSe Sensor Networks” IEEE ICNEWS 2006, 2-4
ns e.html, 2007. January, Dhaka, Bangladesh, 2006, pp. 282-
[35] K. Patrick. A tool for geospatial analysis of 286.
physical activity: Physical activity location [47] Khushboo Batra, & et.al “E-
measurement system (palms). NIH GEI GOVERNANCE IN INDIA ”International
project at the University of California, San Journal of Computing & Business Research
Diego. Available from: ISSN : 2229-6166, Proceedings of ‘I-Society
[36] http://www.gei.nih.gov/exposurebiology/pro 2012’ at GKU, Talwandi Sabo Bathinda
gr am/docs/KevinPatrick.pdf, 2007. (Punjab).
[37] M.S. Goodwin, W.F. Velicer, and S.S. [48] S. C. Mahapatra1and et.al “Current e-
Intille. Telemetric monitoring in the behavior Governance Scenario in Healthcare sector of
sciences. Behavior Research Methods, 2007. India
[38] Min Mun, Sasank Reddy, Katie Shilton, [49] A. S. Lewis and G. Knowles, “Image
Nathan Yau, Jeff Burke, Deborah Estrin, compression using the 2-D wavelet
Mark Hansen, Eric Howard, Ruth West, and transform,” IEEE Trans. Image Processing,
Peter Boda. Peir, the personal environmental vol. 1, pp. 244–250, Apr. 1992.
impact report, as a platform for participatory [50] M. Antonini, M. Barland, P. Mathieu, and I.
sensing systems research. In MobiSys ’09: Daubechies, “Image coding using the
Proceedings of the 7th international wavelet transform,” IEEE Trans. Image
conference on Mobile systems, applications, Processing, vol. 1, pp. 205–220, Apr. 1992.
and services, pages 55–68, New York, NY, [51] M.Shapiro,”Embedded image coding using
USA, 2009. ACM. zero trees of wavelet coefficients,” IEEE
[39] Deffie-Hellman Rfc. Available online: Trans.Signal Processing, vol.41,pp.3445-
http://www.ietf.org/rfc/rfc2631.txt (accessed 3463, Dec.1993.
on 20 July 2011). [52] M. L. Hilton, “Compressing still and moving
[40] Meingast, M.; Roosta, T.;Sastry, S. “Security images with wavelets,” Multimedia Syst.,
and Privacy Issues with Healthcare vol. 2, no. 3, pp. 218–227, 1994.
Information Technology”. In Proceedings of [53] Z. Xiang, K. Ramchandran, M. T. Orchard,
the 28th IEEE EMBS Annual International and Y. Q. Zhang, “A comparative study of
Conference, New York, NY, USA, 31 DCT- and wavelet-based image coding,”
August–3 September 2006; pp. 5453-5458. IEEE Trans. Circuits Syst. Video Technol.,
[41] Bachman JW, The patient computer vol. 9, pp. 692– 695, Apr. 1999
interview- A neglected tool that aid the [54] E. Feig, “A fast scaled DCT algorithm,”
Clinician, Mayo Clinic Proc. 2003; 78 : Proc. SPIE—Image Process. Algorithms
Pages: 67-8. Techn., vol. 1244, pp. 2–13, Feb. 1990.
[42] Blobel B, Nerdberg R and et al, Modeling [55] Kennedy.J; Eberhart.R; “Particle Swarm
privilege Management and access control, Optimizing” Bur. Of Labor stat.
International Journal of Medical Informatics, Washington,DC,USA. IEEE, International
2006,75:597 Conferrence on Nov/Dec 1995.
[43] Bruno von Nirman, Steve brown User [56] Grill-Specter, K., Sayres, R., and Ress, D.
experience design guidelines for Tele-care (2006). “High-resolution imaging reveals
(e- Health) Services, Interactions, Sept 2007, highly selective nonface clusters in the
Pages: 36-40. fusiform face area.” Nature Neu-roscience 9
[44] Community Information Centre Web site (9) 1177-1185
http://www.cic.nic.in la last visited 30 [57] Haxby, J., Gobbini, M., Furey, M., Ishai, A.,
Sep’08 Schouten, J., and Pietrini,
P.(2001).” Distributed and Overlapping

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1180


Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018)
IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN:978-1-5386-0807-4; DVD Part Number:CFP18J06DVD, ISBN:978-1-5386-0806-7

Representations of Faces and Objects in


Ventral Temporal Cortex Science” 293
2425-2430
[58] LaConte, S., Peltier, S., and Hu, X. (2002).
“Real-TimefMRI Using Brain-State
Classification uman Brain Mapping
“281033-1044
[59] S. Bauer, B. Zovko-Cihlar, and M. Grgic,
“The influence of impairments from
digitalcompression of video signal on
perceived picture quality,” in Proc. 3rd Int.
Workshop Image and Signal Processing,
IWISP’96, Manchester, U.K., 1996, pp. 245–
248.
[60] A.Said and W.A.Pearlman, “A new fast and
efficient image codec based on set
partitioning in hierarchical trees”, IEEE
Trans. Circuit Syst. Video Technol., vol.6,
pp.243- 250, June1996

978-1-5386-0807-4/18/$31.00 ©2018 IEEE 1181

You might also like